Try our new research platform with insights from 80,000+ expert users

ExtraHop Reveal(x) for IT Operations vs Splunk Enterprise Security comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 19, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

ExtraHop Reveal(x) for IT O...
Ranking in IT Operations Analytics
14th
Average Rating
8.6
Reviews Sentiment
7.3
Number of Reviews
8
Ranking in other categories
Network Monitoring Software (72nd), Network Diagnostics (12th), Network Packet Capture (8th)
Splunk Enterprise Security
Ranking in IT Operations Analytics
1st
Average Rating
8.4
Reviews Sentiment
7.3
Number of Reviews
369
Ranking in other categories
Log Management (2nd), Security Information and Event Management (SIEM) (1st)
 

Mindshare comparison

As of October 2025, in the IT Operations Analytics category, the mindshare of ExtraHop Reveal(x) for IT Operations is 3.1%, up from 2.0% compared to the previous year. The mindshare of Splunk Enterprise Security is 22.4%, down from 27.5% compared to the previous year. It is calculated based on PeerSpot user engagement data.
IT Operations Analytics Market Share Distribution
ProductMarket Share (%)
Splunk Enterprise Security22.4%
ExtraHop Reveal(x) for IT Operations3.1%
Other74.5%
IT Operations Analytics
 

Featured Reviews

Out West - PeerSpot reviewer
Great for identifying application interdependencies with helpful support but needs better visualizations
We're just trying to identify the application interdependencies, which normally reside on different servers, including web servers, database servers, enterprise service bus, et cetera, up to your presentation layer before we start moving stuff around. Normally, the reason why we use these tools is to understand what assets we have, where they're deployed, and how they enter and operate before we decide to go move something from point A to point B. The solution is going to allow me to establish a wave or migration plan where you have different waves of migration and then you actually have move groups to try and get your application moved from A to B seamlessly. A to B could be on-premise to on-premise. It could be on-premise to cloud. Et cetera. The solution can tell me what components can I deploy, for example, into a cloud space, without having to refactor my applications since that can be quite time-consuming and costly.
Kyle Vernham - PeerSpot reviewer
Built-in searches and unified data access streamline alert investigation and boosts analyst efficiency
The two features I appreciate the most in Splunk Enterprise Security are the built-in searches, which have been very easy for us to get started with right out of the box, and the fact that it accesses all of our other systems. You can access it as a pane of glass rather than having to search individually. We also have the option to compare our analysts from our service to service. Splunk Enterprise Security helps our SOC team prioritize and investigate high-fidelity alerts more effectively by providing a more in-depth look and the ability to access a lot more of our data. Instead of jumping from several segmented systems, it allows us to have everything brought together in one place. For example, you have to move from our purview to our build system and to Splunk Enterprise Security, and it enables us to streamline that process. The built-in features of Splunk Enterprise Security, which we recently procured, have given us a good starting point and demonstrated the value of the product, providing an easy way to sell it to our company. The ease of getting everything into our purview helps us, and it serves as a good start for the investigation part in one location rather than what we usually have, which is jumping from system to system to system. Splunk Enterprise Security plays a role in our company's strategy to combat insider threats and advanced persistent threats by currently being in its technical test phase. We are still rolling it out, and it should help us find any insider threats based on information that our policy states should not be present in our system. Splunk Enterprise Security's risk-based alerting (RBA) has impacted our alert volume and analyst productivity because we've got many different systems feeding into it. However, it has helped to make it easier for our analysts to go through a set of events rather than 100 alerts. RBA allows us to streamline the process and customize it for our analysts. When it comes to leveraging Splunk Enterprise Security's dashboards and visualizations to communicate security posture to executives, it's pretty straightforward for any type of information. The visualization is easy to understand, but I haven't had any direct conversations with our executives.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Wire data analytics."
"There are many valuable features in this product, but probably the biggest is the customization capability it has."
"This solution is more applications reference architecture focused. Its benefit is that it specializes in that space."
"The most valuable features are security detections, perimeter detection, dashboards, and alerts."
"The most valuable feature is the way it handles data, from Layer 2 up to Layer 7. We can see everything that happens in the network."
"Not only can you look at the protocol import level. It also has a live PCAP analysis."
"Splunk is a user-friendly solution."
"Splunk Enterprise Security's most valuable features are its stability and the robust Splunk Search Processing Language, allowing extensive customization and analysis capabilities."
"The initial deployment was straightforward."
"The solution has plenty of features that are good."
"The features of Splunk Enterprise Security that I have found most valuable include the risk-based score and UBA/UEBA, user behavior analytics, or user and entity behavior analytics."
"It has a rapid response search environment in the event of an incident."
"The features of Splunk Enterprise Security that I appreciate the most are its flexibility and scalability."
"The scalability is good."
 

Cons

"We'd like to see a local presence within the region in order to have seamless service whether it's the support, the implementation, or professional services."
"They have a new solution, ExtraHop Reveal(x), and I think it needs improvement."
"I would improve the Rule-Based Access Control (RBAC) by providing granular access control to the data."
"They either have to go broad or decide what their bread and butter is and get really good at that."
"This solution would be improved if it had the ability to retain data longer."
"Network visibility is something that needs to be improved."
"Splunk Enterprise Security can provide more details and help CISOs resolve vulnerability situations better. The reason is that the tools we choose for data analysis and log collection cannot collect all the data and logs. Splunk Enterprise Security should help me with this, but it cannot."
"It needs integration with a configuration management solution."
"The most significant challenges I face when using Splunk Enterprise Security for advanced threat detection include not having enough time to be in it, the resources and people to also be in there, and trying to configure it and teach people how to use it. A lack of resources prevents us from giving it the attention it needs."
"We're planning to incorporate UBA and SOAR. It would be good to have everything in one place."
"The way Splunk Enterprise Security could improve is by pulling in and mapping my DHCP data and tracking users' IP addresses as it changes throughout sessions, and being able to keep track of who is actually assigned to what IP address more natively."
"Splunk Enterprise Security incurs a significant cost because of the amount of data we send, but we are fine with the value we're getting for that price."
"I find the process for customizing, developing, testing, deploying, and refining detections in Splunk Enterprise Security to be challenging at times."
"Splunk Enterprise Security is complicated in terms of developing specific cybersecurity use cases."
 

Pricing and Cost Advice

"The pricing is higher than other solutions, but with such good features, I think it's worth it."
"The price of this solution for our environment is about £650,000 ($855,000 USD) for three years."
"The pricing is fair considering the value provided."
"It is possible to use a developer's license, which is up to 10GB per day of volume traffic, which is usually enough for most use cases."
"Splunk Enterprise Security is cheaper than competitors, but I do not know whether it is just our contract."
"Splunk Enterprise Security is expensive. I would rate the cost an eight out of ten with ten being the most expensive."
"Splunk Enterprise Security is priced lower than competitors."
"I assume that the pricing is reasonable, because if it was too costly, there are other alternatives."
"Truly evaluate the data you want to ingest and go slow. Pulling in data that can provide no use to your mission only wastes data against your license."
"I think that most of the monitoring solutions are expensive."
"Splunk Enterprise Security is expensive."
report
Use our free recommendation engine to learn which IT Operations Analytics solutions are best for your needs.
872,655 professionals have used our research since 2012.
 

Comparison Review

VS
Feb 26, 2015
HP ArcSight vs. IBM QRadar vs. ​McAfee Nitro vs. Splunk vs. RSA Security vs. LogRhythm
We at Infosecnirvana.com have done several posts on SIEM. After the Dummies Guide on SIEM, we are following it up with a SIEM Product Comparison – 101 deck. So, here it is for your viewing pleasure. Let me know what you think by posting your comments below. The key products compared here are…
 

Top Industries

By visitors reading reviews
Financial Services Firm
21%
Computer Software Company
13%
Healthcare Company
8%
Educational Organization
7%
Financial Services Firm
14%
Computer Software Company
14%
Manufacturing Company
8%
Government
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business3
Midsize Enterprise2
Large Enterprise3
By reviewers
Company SizeCount
Small Business110
Midsize Enterprise50
Large Enterprise257
 

Questions from the Community

Ask a question
Earn 20 points
What SOC product do you recommend?
For tools I’d recommend: -SIEM- LogRhythm -SOAR- Palo Alto XSOAR Doing commercial w/o both (or at least an XDR) is asking to miss details that are critical, and ending up a statistic. Also, rememb...
What is a better choice, Splunk or Azure Sentinel?
It would really depend on (1) which logs you need to ingest and (2) what are your use cases Splunk is easy for ingestion of anything, but the charge per GB/Day Indexed and it gets expensive as log ...
How does Splunk compare with Azure Monitor?
Splunk handles a high amount of data very well. We use Splunk to capture information and as an aggregator for monitoring information from different sources. Splunk is very good at alerting us if we...
 

Overview

 

Sample Customers

Alaska Airlines, bet365, Concur, McKesson, Microsoft, Morgan Stanley, Practice Fusion, Seattle Children's Hospital, Steward Health Care System
Splunk has more than 7,000 customers spread across over 90 countries. These customers include Telenor, UniCredit, ideeli, McKenney's, Tesco, and SurveyMonkey.
Find out what your peers are saying about ExtraHop Reveal(x) for IT Operations vs. Splunk Enterprise Security and other solutions. Updated: September 2025.
872,655 professionals have used our research since 2012.